Completion of this lab in the Maryville Virtual Applications environment is not necessary. This exercise may be completed in a standard web browser on your computer or within the Virtual

Completion of this lab in the Maryville Virtual Applications environment is not necessary. This exercise may be completed in a standard web browser on your computer or within the Virtual Applications environment. Within your , you have access to the instructions needed to access eLumin and Maryville Virtual Applications. Reach out to your instructor or the Maryville Desk if you are having difficulties accessing the software for this course. This project uses an Enigma machine simulator. It functions like the Enigma machines used during WWII. This example has been included to you better understand how encryption worked in the early days. It’s a great learning tool for when you first start exploring the subject of cryptography. Enigma machines provided fairly good encryption strength for their day. Modern cryptographic systems are much more secure than Enigma machines. Pay attention to the colored paths as you type. The red path goes through the three rotors, bounces off the reflector, becomes green, and then goes back through the three rotors. The right rotor moves with each keystroke. If it completes one full cycle, it will advance the middle rotor and subsequently the left rotor. This is the next chapter of your lab book for the semester. Each Lab Assignment is a new chapter in your lab book. Your lab book chapter each week should include: Yes, we normally provide steps to follow and a general direction of what is necessary to complete the assignment…..   but they are not recipes…   they are diving boards for exploration.   Sometimes things do not work perfectly…  that’s OK..  note it in your lab book and continue.   The intent is to provide the general direction…  the assignment is intended for you to run with it and learn!!

Do you need us to help you on this or any other assignment?


Make an Order Now